[go: up one dir, main page]

Patel et al., 2004 - Google Patents

A gesture-based authentication scheme for untrusted public terminals

Patel et al., 2004

View HTML
Document ID
8765655724322333539
Author
Patel S
Pierce J
Abowd G
Publication year
Publication venue
Proceedings of the 17th annual ACM symposium on User interface software and technology

External Links

Snippet

Powerful mobile devices with minimal I/O capabilities increase the likelihood that we will want to annex these devices to I/O resources we encounter in the local environment. This opportunistic annexing will require authentication. We present a sensor-based …
Continue reading at www.academia.edu (HTML) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/72Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
    • H04M1/725Cordless telephones
    • H04M1/72519Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status
    • H04M1/72522With means for supporting locally a plurality of applications to increase the functionality
    • H04M1/72527With means for supporting locally a plurality of applications to increase the functionality provided by interfacing with an external accessory
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/66Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0853Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Similar Documents

Publication Publication Date Title
Patel et al. A gesture-based authentication scheme for untrusted public terminals
Ferrag et al. Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues
US7278024B2 (en) Session authentication using temporary passwords
US8807426B1 (en) Mobile computing device authentication using scannable images
Akula et al. Image based registration and authentication system
Farb et al. Safeslinger: easy-to-use and secure public-key exchange
Lu et al. Dynamic key-updating: Privacy-preserving authentication for RFID systems
Mayrhofer et al. Adversary models for mobile device authentication
JP2007174633A (en) Computer implementation method for securely acquiring binding key for token device and secure memory device, and system for securely binding token device and secure memory device
BRPI0617970A2 (en) method and arrangement for secure authentication
EP2182457A1 (en) Dynamic PIN verification for insecure environment
He et al. On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
Damopoulos et al. Hands-free one-time and continuous authentication using glass wearable devices
Park et al. Security analysis and enhancements of an improved multi-factor biometric authentication scheme
Cetin Design, testing and implementation of a new authentication method using multiple devices
WO2023016682A1 (en) Authentication processing services for generating high-entropy cryptographic keys
Chan et al. Glass otp: Secure and convenient user authentication on google glass
CN106657166B (en) A kind of method of authentication, terminal device and server
Li et al. Tap-wave-rub: Lightweight malware prevention for smartphones using intuitive human gestures
Shrestha et al. Tap-wave-rub: Lightweight human interaction approach to curb emerging smartphone malware
US7958539B2 (en) System and method for providing secure access to password-protected resources
Papaioannou et al. User authentication and authorization for next generation mobile passenger ID devices for land and sea border control
Papaioannou et al. Behavioral biometrics for mobile user authentication: benefits and limitations
Vongsingthong et al. A survey on smartphone authentication
KR20060069611A (en) User Authentication Method in Heterogeneous Network Using Signature of Mobile Communication Terminal